Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Sygnia discovered what it believes to be a variant of the GhostEmperor infection chain leading to the Demodex rootkit – which was first seen and described in 2021.

CISA warns of the in-the-wild exploitation of CVE-2024-39891, a Twilio Authy bug leading to the disclosure of phone number data.

Michigan Medicine is notifying roughly 57,000 individuals of a data breach impacting their personal and health information.

Siemens has released out-of-band updates to patch two potentially serious vulnerabilities in products used in energy supply. 

Verizon subsidiary TracFone Wireless settles for $16 million with the FCC over three old data breaches.

Vanta has raised $150 million in a Series C funding round and it plans on using the money to fuel expansion and AI innovation.

Chrome 127 was promoted to the stable channel with patches for 24 vulnerabilities, including 16 reported externally.

CrowdStrike has shared a preliminary incident review, explaining why the update that caused global chaos was not caught by testing. 

Delta has canceled more than 5,500 flights since the outage started early Friday morning.

KnowBe4 chief executive Stu Sjouwerman: “We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.”

Canadian cybersecurity startup Protexxa closes a $10 million Series A funding round that brings the total raised to $15 million.

People on the Move

Check Point Software has appointed Nadav Zafrir as Chief Executive Officer

BlackFog has named Brenda Robb as President, John Sarantakes as CRO, and Mark Griffith as VP of Strategic Sales

Former NSA cybersecurity chief Rob Joyce has joined Sandfly Security’s Advisory Board.

Commvault has appointed Pranay Ahlawat as Chief Technology and AI Officer (CTAIO).

Teresa Anania has joined Sophos as the company’s new Chief Customer Officer.

More People On The Move
CrowdStrike Remediation Information CrowdStrike Remediation Information

CrowdStrike has shared a preliminary incident review, explaining why the update that caused global chaos was not caught by testing. 

FrostyGoop ICS malware FrostyGoop ICS malware

The FrostyGoop ICS malware was used recently in an attack against a Ukrainian energy firm that resulted in loss of heating for many buildings.

CrowdStrike IT Recovery Tool CrowdStrike IT Recovery Tool

Microsoft says roughly 8.5 million Windows devices were impacted by the faulty software update from CrowdStrike, and published a tool to help admins through the recovery process.

Top Cybersecurity Headlines

CrowdStrike on Saturday provided technical information and remediation guidance to help organizations impacted by the faulty software update that trigged massive IT outages across the globe on Friday.  

CrowdStrike says a routine sensor configuration update pushed to Windows OS triggered a logic error that blue-screened computers worldwide.

Organizations worldwide are reporting major outages due to Windows system crashes caused by a bad CrowdStrike update.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs.

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies.

Learn More

Vulnerabilities

Cybercrime

A former Goldman Sachs programmer responsible for developing programs that power the firm's high-frequency trading systems – a key to millions in profits for the Wall Street giant - was sentenced in Manhattan federal court to 97 months in prison after being found guilty of theft of trade secrets and one count of transportation of stolen property.

While the Internet has no Center, Some Pieces of Infrastructure are More Important to Smooth Global Functioning Than Others.

Twitter Enables Option for HTTPS by DefaultFollowing a trend in allowing users to automatically utilize the secure HTTPS protocol when accessing Web based services, Twitter announced this week that it has added the option for users to force HTTPS connections by default when accessing Twitter.com.

Amazon Web Services has announced expanded functionality of its Virtual Private Cloud (Amazon VPC) Service, by letting enterprises specify which of their Amazon VPC resources they wish to make directly accessible to the Internet and which they do not.

Chicago based Trustwave, a provider of security and compliance solutions, today released a tool that provides its enterprise clients the ability to manage all forms of penetration tests in real-time, and be presented with live, detailed test results and recommendations. With the results gathered from penetration tests, the generically named PenTest Manager displays rich media demonstrations including image slideshows and screen capture videos displaying how vulnerabilities can be exploited.

Call them errors behind the keyboard, cockpit errors, or wetware errors. Sometimes we just say “oops.” But, these terms do not do them justice. In reality, whatever you call them, they are the bane of our existence. Studies show varying ranges on how many of the vulnerabilities, errors, and subsequent data and/or system compromises we see because a user or admin did something wrong. But, do we have any sense for how negligent we, as users, really are?

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Cloud Security

Join us as we explore the latest trends in the world of SaaS security, cyberattacks against cloud infrastructure, data security posture management (DSPM), and...